US9430677B2 - Memory management systems and methods for embedded systems - Google Patents
Memory management systems and methods for embedded systems Download PDFInfo
- Publication number
- US9430677B2 US9430677B2 US13/545,472 US201213545472A US9430677B2 US 9430677 B2 US9430677 B2 US 9430677B2 US 201213545472 A US201213545472 A US 201213545472A US 9430677 B2 US9430677 B2 US 9430677B2
- Authority
- US
- United States
- Prior art keywords
- memory
- data
- selectively
- module
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000003068 static effect Effects 0.000 claims abstract description 22
- 241000287231 Serinus Species 0.000 claims description 20
- 241000287219 Serinus canaria Species 0.000 claims description 9
- 238000011156 evaluation Methods 0.000 claims 2
- 238000007726 management method Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000011065 in-situ storage Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000002922 simulated annealing Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1479—Generic software techniques for error detection or fault masking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/20—Employing a main memory using a specific memory technology
- G06F2212/202—Non-volatile memory
- G06F2212/2022—Flash memory
Definitions
- the technical field generally relates to methods and systems for managing memory, and more particularly relates to methods and systems for managing overflow and underflow conditions of memory in embedded systems.
- Buffer underflow conditions or overflow conditions occur when a software program, while writing data to a buffer, overruns a buffer's boundary and overwrites adjacent memory.
- Buffer overflow and underflow conditions can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security. Thus, they are the basis of many software vulnerabilities.
- Methods and systems are provided for managing static memory associated with software of an embedded system.
- the method includes, but is not limited to, performing one or more steps on one or more processors.
- the steps include, but are not limited to, selectively assigning memory objects to static memory segments based on access of the memory object by the software; managing data of the memory segments based on the assigning; and selectively restoring the data of the memory segments based on the managing.
- a memory management system for managing static memory associated with software of an embedded system.
- the memory management system includes, but is not limited to, one or more computer readable mediums.
- the one or more computer readable mediums include, but are not limited to, a first module that selectively assigns memory objects to static memory segments based on access of the memory object by the software.
- the one or more computer readable mediums further include, but are not limited to, a second module that manages data of the memory segments based on the assignments.
- the one or more computer readable mediums further include, but are not limited to, a third module that selectively restores the data of the memory segments based on the managing.
- FIG. 1 is functional block diagram of an embedded control system that includes a memory management system in accordance with various embodiments
- FIGS. 2 and 3 are dataflow diagrams illustrating a memory management system in accordance with various embodiments
- FIG. 4 is an illustration of a memory object map of the memory management system in accordance with various embodiments.
- FIG. 5 is an illustration of a simultaneous access graph of the memory management system in accordance with various embodiments.
- FIG. 6 is an illustration of an allowable neighbors graph of the memory management system in accordance with various embodiments.
- FIGS. 7-12 are illustrations of static memory that is managed by the memory management system in accordance with various embodiments.
- FIGS. 13-15 are flowcharts illustrating memory management methods in accordance with various embodiments.
- module refers to any hardware, firmware, electronic control component, processing logic, and/or processor device, individually or in any combination, including without limitation: application specific integrated circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and memory that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
- ASIC application specific integrated circuit
- the memory management system 10 manages memory and memory operations such that the memory can be restored when an underflow condition or an overflow condition occurs.
- the memory management system 10 manages static memory for a particular software application 11 .
- the software application may be any software that is programmed for a particular embedded system.
- the memory management system 10 includes a computing device 12 and an embedded device 13 .
- the computing device 12 includes memory 14 and a processor 16 .
- the memory 14 can be at least one of the random access memory, read only memory, a cache, a stack, or the like which may temporarily or permanently store electronic data.
- the processor 16 can be any custom made or commercially available processor, a central processing unit, an auxiliary processor among several processors associated with the computing device, a semiconductor based microprocessor, a macroprocessor, or generally any device for executing instructions.
- the computing device 12 can be any computing device including, but not limited to, a desktop computer, a laptop computer, a workstation, a server, a portable handheld device, or other computing device that includes memory and a processor.
- the software compiler 18 includes software instructions that, when executed by the processor 16 , compile the software 11 into executable code (SwC) 20 .
- the compiler 18 includes a compile time module 22 in accordance with various embodiments.
- the compile time module 22 when compiling the software, selectively assigns memory objects of the software 11 to memory segments of static memory that is to be used by the executable code 20 when executing.
- the assignment of the memory objects is performed such that any buffer overflow and underflow conditions that may occur during execution of the executable code 20 can be identified and responded to. For example, the assignment is performed such that memory objects that may be accessed simultaneously during execution of the executable code 20 are not assigned to adjacent segments of the static memory.
- the embedded device 13 includes memory 24 and a processor 26 .
- the memory 24 can be at least one of the random access memory, read only memory, a cache, a stack, or the like which may temporarily or permanently store electronic data.
- the processor 26 can be any custom made or commercially available processor, a central processing unit, an auxiliary processor among several (core) processors associated with the computing device, a semiconductor based microprocessor, a macroprocessor, or generally any device for executing instructions.
- the embedded device 13 can be any embedded software device, including but not limited to, a control device, a consumer electronic, transportation electronic, or any other embedded software device that includes memory 24 and a processor 26 .
- the executable code 20 Stored in the memory 24 of the embedded device 13 is the executable code 20 .
- the executable code 20 includes a run time module 28 that is executed during operation of the software.
- the runtime module 28 performs methods for recovering from underflow or overflow conditions based on the placement of the memory objects in the static memory. For example, the runtime module 28 selectively copies portions of memory from adjacent memory segments to another area of memory (e.g., a backup stack) and restores the memory affected by an underflow or overflow condition using the copy of the memory. In some cases no memory copy operation may be performed. For example, a memory copy portion size may be set to zero, and then may be adaptively increased with each fault that the system is unable to recover from.
- FIGS. 2 and 3 dataflow diagrams illustrate various embodiments of the compile time module 22 and the runtime module 28 of the memory management system 10 .
- Various embodiments of compile time modules 22 and runtime modules 28 according to the present disclosure may include any number of sub-modules.
- the sub-modules shown in FIGS. 2 and 3 may be combined and/or further partitioned to similarly manage the memory such that recovery from a buffer underflow condition or overflow condition can be achieved.
- the compile time module 22 includes a graph determination sub-module 30 , and a memory assignment sub-module 32 .
- the graph determination sub-module 30 processes the software 11 to determine a memory object map 34 ( FIG. 4 ).
- the memory object map 34 includes, but is not limited to, a listing of the memory objects 500 (e.g., memory objects 1-5), the software (e.g., functions or subroutines) 501 that utilizes the memory objects (e.g., software 1-4), and the processor or core 502 that the software is to be executed on (e.g., core 1 or core 2).
- the graph determination sub-module 30 determines a simultaneous access graph (SAG) 36 ( FIG. 5 ).
- SAG simultaneous access graph
- the simultaneous access graph 36 includes nodes 38 and edges 40 .
- the nodes 38 represent each memory object.
- the edges 40 represent each memory object pair that can be accessed simultaneously at SwC granularity.
- the graph determination sub-module 30 obtains an allowable neighbors graph 42 ( FIG. 6 ).
- the allowable neighbors graph (ANG) 42 similarly includes the nodes 38 and the edges 40 .
- the edges 40 are weighted based on the severity of the fault if the first memory object of the memory object pairs corrupts the other memory object, the cost incurred if the first memory object corrupts the other memory object, and the probability of the first memory object corrupting the second memory object.
- the weight can be a value (e.g., from zero to one, or any other value) that indicates the impact of resetting the software, a part of the software, or the system if the memory corruption cannot be recovered by copying back memory objects.
- the graph determination sub-module 30 determines a minimum cost layout 44 of the memory objects within the static memory. For example, the graph determination sub-module 30 determines the minimum cost layout by solving a shortest tour problem. The shortest tour problem finds the ordering of memory objects such that the net penalty is minimized. As can be appreciated, other techniques, such as, but not limited to, Simulated Annealing may be used to solve this combinatorial optimization problem.
- ANG illustrated in this disclosure has un-directed edges, it is appreciated that directed graphs may be used if the penalty incurred is not symmetric. For example, when a penalty of a source overflowing or underflowing and corrupting a destination (for an edge between a source and a destination) is not the same as the destination overflowing or underflowing and corrupting the source, then two directed edges may be implemented, each having different weights.
- the memory object assignment sub-module 32 receives as input the minimum cost layout 44 . Based on the minimum cost layout 44 , the memory object assignment sub-module 32 assigns the memory objects to segments of the static memory. For example, the memory object assignment sub-module 32 assigns one of the memory objects of the memory object pair to a non-adjacent segment of the other memory object per the minimum cost layout 44 .
- the memory layout as determined by solving the shortest tour problem presents a total ordering (a single sequence) of the memory objects. The memory object assignment sub-module 32 may simply place the memory objects one after the other as per this total ordering.
- the runtime module 28 includes an entry sub-module 48 and an exit sub-module 50 .
- the entry sub-module 48 is executed at the start of the software or a portion of the software.
- the entry sub-module 48 prepares the static memory 51 for recovery from a potential underflow or overflow condition.
- the entry sub-module 48 first obtains locks for the memory segments 52 that contain memory objects that are accessed by the software and the memory segments 54 , 56 adjacent (i.e., sequentially before and after) to the memory segment 52 that are accessed by the software.
- the entry sub-module 48 then, as shown in FIG. 8 , copies memory portions 58 , 60 of a predefined size from the memory segments 54 , 56 adjacent to the memory segment 52 to backup memory 62 (e.g., the backup stack).
- the entry sub-module 48 then, as shown in FIG. 9 , sets canaries 64 - 70 for each of the adjacent memory segments 54 , 56 .
- the placement of the canaries 64 - 70 is based on the predefined size of the memory portions 58 , 60 .
- the canaries 64 - 70 are values that are placed as pairs between the memory segments 54 and 52 and 52 and 56 such that a failed verification of the canary data is an alert of an overflow or underflow condition and a type of overflow or underflow condition.
- the first data to be corrupted will be the canary 66 or 68 . If only the canary 66 or 68 is corrupted, then the overflow or underflow condition can be recovered from. If the canary 64 or 70 is corrupted, an overflow or underflow condition has occurred which cannot be recovered from.
- the canaries are in-situ canaries which are temporal in nature. The canaries can be set by XOR-ing a random number with the memory object
- the exit sub-module 50 is executed at the end of the software or the portion of software.
- the exit sub-module 50 evaluates the static memory 51 for overflow or underflow faults and restores any corrupted memory, if possible.
- the exit sub-module 50 evaluates the canaries 64 - 70 to determine if either one of the adjacent memory segments have been corrupted by an underflow and/or overflow condition and to determine the severity of the corruption. For example, as shown in FIG. 10 , if one of the canaries 66 for the adjacent memory segment 54 does not equal the predefined value, then corruption has occurred. In another example, as shown in FIG. 11 , if both of the canaries 66 , 64 for the particular adjacent memory segment 54 do not equal the predefined value, the severity of the corruption is such that the static memory 51 cannot be restored.
- the exit sub-module 50 restores the corrupted memory object by copying the memory portions 58 , 60 from the backup memory 62 back to the memory segments 54 and 56 as shown in FIG. 12 and the locks are released.
- the canaries are restored to the original content by XOR-ing it again with the earlier random number. This allows any memory location to be used as a canary for specific intervals of time. If, however, the memory 51 cannot be restored (as shown in FIG. 11 ), the portion size for the copy is increased, the locks are released, and the software is reset.
- FIGS. 13-15 and with continued reference to FIGS. 1 through 12 , flowcharts illustrate memory management methods that can be performed by the memory management system 10 of FIG. 1 in accordance with various embodiments.
- the order of operation within the methods is not limited to the sequential execution as illustrated in FIGS. 13-15 , but may be performed in one or more varying orders as applicable and in accordance with the present disclosure.
- one or more steps of the method may be added or deleted without altering the spirit of the method.
- the methods may be scheduled to run at predetermined intervals, or scheduled to run based on predetermined events.
- FIG. 13 illustrates an exemplary compile time method that may be performed by the compile time module 22 .
- the method may begin at 100 .
- the software is evaluated and a SAG 36 is determined at 110 .
- the ANG 42 including the weights is determined at 120 .
- the minimum cost layout 44 is determined from the ANG 42 at 130 .
- the memory objects assignments 46 are determined at 140 . Thereafter, the method may end at 150 .
- FIG. 14 illustrates an exemplary software entry method that may be performed by the entry sub-module 48 .
- the method may begin at 200 .
- the static memory 51 is managed at 220 - 240 .
- a lock is obtained of the memory segment that contains the memory object to be accessed by the SwC and the adjacent memory segments at 220 .
- the memory portions of the adjacent memory segments are copied to the backup stack at 230 ; and the canaries are set at 240 .
- the method may end at 260 . Thereafter, the software SwC may be executed.
- FIG. 15 illustrates an exemplary software exit method that may be performed by the exit sub-module 50 .
- the method may begin at 300 . It is determined whether there is any memory corruption and whether it is restorable at 310 . If the memory corruption is restorable at 310 , for each memory object of the software SwC that has executed on the core k at 320 , the memory segment is restored at 330 - 340 . For example, the memory segments are restored by copying back the memory portions from the backup stack to the memory segment locations at 330 ; and the memory content used by the canaries are restored at 340 . Once all of the memory objects for SwC have been processed at 320 , the locks for the memory segments are released at 350 and the method may end at 360 .
- the size of the memory portions is increased at 370 .
- the locks for the memory segments are released at 380 and the software system/sub-system is reset at 390 . Thereafter, the method may end at 360 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Retry When Errors Occur (AREA)
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/545,472 US9430677B2 (en) | 2012-07-10 | 2012-07-10 | Memory management systems and methods for embedded systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/545,472 US9430677B2 (en) | 2012-07-10 | 2012-07-10 | Memory management systems and methods for embedded systems |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140019668A1 US20140019668A1 (en) | 2014-01-16 |
US9430677B2 true US9430677B2 (en) | 2016-08-30 |
Family
ID=49914990
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/545,472 Expired - Fee Related US9430677B2 (en) | 2012-07-10 | 2012-07-10 | Memory management systems and methods for embedded systems |
Country Status (1)
Country | Link |
---|---|
US (1) | US9430677B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12101393B2 (en) * | 2016-06-03 | 2024-09-24 | Cryptography Research, Inc. | Providing access to a hardware resource based on a canary value |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10437720B2 (en) * | 2014-03-12 | 2019-10-08 | Optumsoft, Inc. | Deferred destruction for efficient resource reclamation |
WO2016168202A1 (en) * | 2015-04-14 | 2016-10-20 | Sendyne Corporation | Model numerical solver for system control |
US20170364400A1 (en) * | 2016-06-15 | 2017-12-21 | International Business Machines Corporation | Method for debugging static memory corruption |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6081665A (en) * | 1997-12-19 | 2000-06-27 | Newmonics Inc. | Method for efficient soft real-time execution of portable byte code computer programs |
US6496916B1 (en) * | 1998-04-17 | 2002-12-17 | Agere Systems Inc. | System for flexible memory paging in partitioning memory |
US20050041644A1 (en) * | 2003-08-05 | 2005-02-24 | Matsushita Electric Industrial Co., Ltd. | Data communication apparatus and data communication method |
US20060155791A1 (en) * | 2005-01-07 | 2006-07-13 | Azul Systems, Inc. | System and method for concurrent compacting self pacing garbage collection using loaded value and access barriers |
US7272748B1 (en) * | 2004-03-17 | 2007-09-18 | Symantec Corporation | Method and apparatus to detect and recover from a stack frame corruption |
US20080133866A1 (en) * | 2004-10-07 | 2008-06-05 | Marc Alan Dickenson | Memory overflow management |
US20090083720A1 (en) * | 2007-09-21 | 2009-03-26 | International Business Machines Corporation | Employing identifiers provided by an operating system of a processing environment to optimize the processing environment |
US20100299732A1 (en) * | 2009-05-22 | 2010-11-25 | Microsoft Corporation | Time window based canary solutions for browser security |
US8135994B2 (en) * | 2006-10-30 | 2012-03-13 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
US8291400B1 (en) * | 2007-02-07 | 2012-10-16 | Tilera Corporation | Communication scheduling for parallel processing architectures |
US20130283248A1 (en) * | 2012-04-18 | 2013-10-24 | International Business Machines Corporation | Method, apparatus and product for porting applications to embedded platforms |
-
2012
- 2012-07-10 US US13/545,472 patent/US9430677B2/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6081665A (en) * | 1997-12-19 | 2000-06-27 | Newmonics Inc. | Method for efficient soft real-time execution of portable byte code computer programs |
US6496916B1 (en) * | 1998-04-17 | 2002-12-17 | Agere Systems Inc. | System for flexible memory paging in partitioning memory |
US20050041644A1 (en) * | 2003-08-05 | 2005-02-24 | Matsushita Electric Industrial Co., Ltd. | Data communication apparatus and data communication method |
US7272748B1 (en) * | 2004-03-17 | 2007-09-18 | Symantec Corporation | Method and apparatus to detect and recover from a stack frame corruption |
US20080133866A1 (en) * | 2004-10-07 | 2008-06-05 | Marc Alan Dickenson | Memory overflow management |
US20060155791A1 (en) * | 2005-01-07 | 2006-07-13 | Azul Systems, Inc. | System and method for concurrent compacting self pacing garbage collection using loaded value and access barriers |
US8135994B2 (en) * | 2006-10-30 | 2012-03-13 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
US8291400B1 (en) * | 2007-02-07 | 2012-10-16 | Tilera Corporation | Communication scheduling for parallel processing architectures |
US20090083720A1 (en) * | 2007-09-21 | 2009-03-26 | International Business Machines Corporation | Employing identifiers provided by an operating system of a processing environment to optimize the processing environment |
US20100299732A1 (en) * | 2009-05-22 | 2010-11-25 | Microsoft Corporation | Time window based canary solutions for browser security |
US20130283248A1 (en) * | 2012-04-18 | 2013-10-24 | International Business Machines Corporation | Method, apparatus and product for porting applications to embedded platforms |
Non-Patent Citations (10)
Title |
---|
Berger, E. D. and Zorn, B. G. 2006. Diehard: probabilistic memory safety for unsafe languages. In PLDI, M. I. Schwartzbach and T. Ball, Eds. ACM, 158-168. |
Candea, G., Brown, A. B., Fox, A., and Patterson, D. 2004. Recovery-oriented computing: Building multitier dependability. IEEE Computer 37,11,60-67. |
Carzaniga, A., Gorla, A., and Pezz'e, M. 2008. Self-healing by means of automatic workarounds. In SEAMS '08: Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems. ACM, New York, NY, USA, 17-24. |
Demsky, B. and Rinard, M. C. 2006. Goal-directed reasoning for specification-based data structure repair. IEEE Trans. Softw. Eng. 32, 12, 931-951. |
Etoh, H.. Gcc extensions for protecting application from stack smashing attacks [online]. 2010. Retrieved from Internet: . |
Etoh, H.. Gcc extensions for protecting application from stack smashing attacks [online]. 2010. Retrieved from Internet: <URL: www.trl.ibm.com/projects/security/ssp/>. |
Perkins, J. H., Kim, S., Larsen, S., Amarasinghe, S., Bachrach, J., Carbin, M., Pacheco, C., Sherwood, F., Sidiroglou, S., Sullivan, G., Wong, W.-F., Zibin, Y., Ernst, M. D., and Rinard, M. 2009. Automatically patching errors in deployed software. In SOSP '09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles. ACM, New York, NY, USA, 87-102. |
Ruwase, O. and Lam, M. S. 2004. A practical dynamic buffer overflow detector. In NDSS. The Internet Society. |
Sidiroglou, S., Laadan, O., Perez, C., Viennot, N., Nieh, J., and Keromytis, A. D. 2009. Assure: automatic software self-healing using rescue points. In ASPLOS '09: Proceeding of the 14th international conference on Architectural support for programming languages and operating systems. ACM, New York, NY, USA, 37-48. |
Wang, L., Zhang, Q., and Zhao, P. 2008. Automated detection of code vulnerabilities based on program analysis and model checking. In Source Code Analysis and Manipulation, 2008 Eighth IEEE International Working Conference on. 165-173. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12101393B2 (en) * | 2016-06-03 | 2024-09-24 | Cryptography Research, Inc. | Providing access to a hardware resource based on a canary value |
Also Published As
Publication number | Publication date |
---|---|
US20140019668A1 (en) | 2014-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11327828B2 (en) | Process automation action repository and assembler | |
EP3663921B1 (en) | Workload repetition redundancy | |
US8677189B2 (en) | Recovering from stack corruption faults in embedded software systems | |
US9836354B1 (en) | Automated error detection and recovery for GPU computations in a service environment | |
EP3663920B1 (en) | Buffer checker | |
US9063906B2 (en) | Thread sparing between cores in a multi-threaded processor | |
EP1974272B1 (en) | Method and apparatus for detecting a fault condition and restoration thereafter using user context information | |
US9047192B2 (en) | Signature-based store checking buffer | |
KR102031606B1 (en) | Versioned memory implementation | |
US9870221B2 (en) | Providing code change job sets of different sizes to validators | |
US10545839B2 (en) | Checkpointing using compute node health information | |
US9430677B2 (en) | Memory management systems and methods for embedded systems | |
US20140156975A1 (en) | Redundant Threading for Improved Reliability | |
US12045675B2 (en) | Safety monitor for incorrect kernel computation | |
US10733065B2 (en) | Recovery of local resource | |
Esposito et al. | On the consolidation of mixed criticalities applications on multicore architectures | |
US10719379B2 (en) | Fault isolation in transaction logs | |
Sutaria et al. | Fault Prediction and Mitigation in Cloud Computing. | |
CN115840691A (en) | Remote repair of crash processes | |
US10104042B2 (en) | Security policy management | |
Axer | Performance of time-critical embedded systems under the influence of errors and error handling protocols | |
US11868855B2 (en) | Resiliency for machine learning workloads | |
Benoit et al. | Two-level checkpointing and verifications for linear task graphs | |
Benoit et al. | Two-level checkpointing and partial verifications for linear task graphs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAS, DIPANKAR;REEL/FRAME:028541/0862 Effective date: 20120626 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST COMPANY, DELAWARE Free format text: SECURITY AGREEMENT;ASSIGNOR:GM GLOBAL TECHNOLOGY OPERATIONS LLC;REEL/FRAME:030694/0500 Effective date: 20101027 |
|
AS | Assignment |
Owner name: GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:034287/0415 Effective date: 20141017 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240830 |